SlideShare a Scribd company logo
1 of 24
Experiments and analysis on Hypervisor-Based Fault Tolerance in Virtualized Environments P. Baglietto, M. Maresca,  M. Stecca CIPI - Computer Platform Research Center University of Genoa and Padua, Italy Munich, 11th October 2011 5th GI/ITG KuVS Fachgespräch on NG SDPs
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction (1/3) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction (2/3) ,[object Object],Hypervisor Managed at Hypervisor level Hardware Against hardware failures Hardware Hardware VM VM The FT property refers to VMs VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM ,[object Object],[object Object],[object Object],VM VM = Not Protected = Protected VM VM VM VM VM VM VM VM VM VM VM VM VM VM
Introduction (3/3) ,[object Object],Common idea behind the “CloudPhone” (Intel) and the “Virtual Smartphone over IP” projects (NTT)    mobile devices should be supported by Server-Side platforms to compensate their limited on-board resources (e.g., CPU, memory, storage, battery energy, etc.)  Source: Mitsutaka Itoh et al., "Virtual Smartphone over IP", NTT Technical Review. Vol. 8 No. 7 July 2010.
The FT in the VMware system ,[object Object],[object Object],[object Object],[object Object],[object Object],* This is the difference respect of “VMware High Availability” Logging Link Hypervisor Hardware Hardware Hardware Hypervisor Hardware Hardware Hardware VM*  VM* VM VM VM VM VM VM VM VM VM VM*
Experiments Hardware Setup  Physical Hosts:  IBM Blade Center HS22 (2 Intel E5530 processors at 2,4 GHz, 32GB RAM) Hypervisor:  ESX (VMware vSphere) Guest OS:  Red Hat Enterprise Linux 5.4 64 bit  Sniffers:  both the Traffic Injector Sniffer TI_Sniffer and the Logging Sniffer Log_Sniffer run Wireshark (promiscuous mode)
Experiment #1 (1/3) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Experiment #1 (2/3) Original TCP SYN message captured by TI_Sniffer Original TCP SYN message captured by TI_Sniffer “ Forwarded” TCP SYN message captured by Log_Sniffer
Experiment #1 (3/3) ,[object Object],where ACK = “Real” ACK ACK* = Forwarded ACK (VM1    VM2) ACK** = “Log” ACK (VM2    VM1)
Experiment #2 (1/4) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Experiment #2 (2/4) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The transition from HOST_1 to HOST_2 happened  transparently C
Experiment #2 (3/4) ,[object Object],BUT…  What happened behind the scenes?
Experiment #2 (4/4) ,[object Object],[object Object]
Experiment #3 (1/2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Experiment #3 (2/2) ,[object Object],[object Object]
Experiment #4 (1/3) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Experiment #4 (2/3) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Experiment #4 (3/3) ,[object Object],[object Object]
Case Study (1/3) ,[object Object],[object Object]
Case Study (2/3) ,[object Object],[object Object],[object Object],[object Object]
Case Study (3/3) ,[object Object],[object Object],[object Object],[object Object],[object Object],Latency Avg (Âľs) Throughput (Events/sec) Log. Traffic (KB/sec) FT On 82 15948870 761 FT Off 60 16187340 Not Applicable
Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Q&A ,[object Object],[object Object],[object Object]

More Related Content

What's hot

Communication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed SystemsCommunication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed Systemsguest61205606
 
Synchronization in distributed systems
Synchronization in distributed systems Synchronization in distributed systems
Synchronization in distributed systems SHATHAN
 
Data Replication in Distributed System
Data Replication in  Distributed SystemData Replication in  Distributed System
Data Replication in Distributed SystemEhsan Hessami
 
Physical and Logical Clocks
Physical and Logical ClocksPhysical and Logical Clocks
Physical and Logical ClocksDilum Bandara
 
Chapter 18 - Distributed Coordination
Chapter 18 - Distributed CoordinationChapter 18 - Distributed Coordination
Chapter 18 - Distributed CoordinationWayne Jones Jnr
 
Linux System Monitoring
Linux System Monitoring Linux System Monitoring
Linux System Monitoring PriyaTeli
 
Implementation of a Deadline Monotonic algorithm for aperiodic traffic schedu...
Implementation of a Deadline Monotonic algorithm for aperiodic traffic schedu...Implementation of a Deadline Monotonic algorithm for aperiodic traffic schedu...
Implementation of a Deadline Monotonic algorithm for aperiodic traffic schedu...Andrea Tino
 
Synchronization Pradeep K Sinha
Synchronization Pradeep K SinhaSynchronization Pradeep K Sinha
Synchronization Pradeep K SinhaJawwad Rafiq
 
FlexSC
FlexSCFlexSC
FlexSCYongraeJo
 
RTOS MICRO CONTROLLER OPERATING SYSTEM-2
RTOS MICRO CONTROLLER OPERATING SYSTEM-2RTOS MICRO CONTROLLER OPERATING SYSTEM-2
RTOS MICRO CONTROLLER OPERATING SYSTEM-2JOLLUSUDARSHANREDDY
 
Chapter05 new
Chapter05 newChapter05 new
Chapter05 newvmummaneni
 
8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating SystemsDr Sandeep Kumar Poonia
 
resource management
  resource management  resource management
resource managementAshish Kumar
 
Distributed System
Distributed System Distributed System
Distributed System Nitesh Saitwal
 
Global state recording in Distributed Systems
Global state recording in Distributed SystemsGlobal state recording in Distributed Systems
Global state recording in Distributed SystemsArsnet
 

What's hot (20)

Distributed System
Distributed SystemDistributed System
Distributed System
 
Communication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed SystemsCommunication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed Systems
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Synchronization in distributed systems
Synchronization in distributed systems Synchronization in distributed systems
Synchronization in distributed systems
 
Data Replication in Distributed System
Data Replication in  Distributed SystemData Replication in  Distributed System
Data Replication in Distributed System
 
Physical and Logical Clocks
Physical and Logical ClocksPhysical and Logical Clocks
Physical and Logical Clocks
 
Chapter 18 - Distributed Coordination
Chapter 18 - Distributed CoordinationChapter 18 - Distributed Coordination
Chapter 18 - Distributed Coordination
 
Linux System Monitoring
Linux System Monitoring Linux System Monitoring
Linux System Monitoring
 
Implementation of a Deadline Monotonic algorithm for aperiodic traffic schedu...
Implementation of a Deadline Monotonic algorithm for aperiodic traffic schedu...Implementation of a Deadline Monotonic algorithm for aperiodic traffic schedu...
Implementation of a Deadline Monotonic algorithm for aperiodic traffic schedu...
 
Synchronization Pradeep K Sinha
Synchronization Pradeep K SinhaSynchronization Pradeep K Sinha
Synchronization Pradeep K Sinha
 
FlexSC
FlexSCFlexSC
FlexSC
 
RTOS MICRO CONTROLLER OPERATING SYSTEM-2
RTOS MICRO CONTROLLER OPERATING SYSTEM-2RTOS MICRO CONTROLLER OPERATING SYSTEM-2
RTOS MICRO CONTROLLER OPERATING SYSTEM-2
 
6.Distributed Operating Systems
6.Distributed Operating Systems6.Distributed Operating Systems
6.Distributed Operating Systems
 
Chapter05 new
Chapter05 newChapter05 new
Chapter05 new
 
Distributed Operating System_2
Distributed Operating System_2Distributed Operating System_2
Distributed Operating System_2
 
8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems
 
resource management
  resource management  resource management
resource management
 
Distributed System
Distributed System Distributed System
Distributed System
 
Global state recording in Distributed Systems
Global state recording in Distributed SystemsGlobal state recording in Distributed Systems
Global state recording in Distributed Systems
 
Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
 

Viewers also liked

IEEE ICIN 2011
IEEE ICIN 2011IEEE ICIN 2011
IEEE ICIN 2011steccami
 
The Apparent Complete Response- Ian Geh
The Apparent Complete Response- Ian GehThe Apparent Complete Response- Ian Geh
The Apparent Complete Response- Ian Gehjimmystrein
 
K14 strategi perubahan pendidikan
K14 strategi perubahan pendidikanK14 strategi perubahan pendidikan
K14 strategi perubahan pendidikanSaifatul Nurul Zaima
 
Organisational and cultural factors that promote resilience
Organisational and cultural factors that promote resilienceOrganisational and cultural factors that promote resilience
Organisational and cultural factors that promote resilienceEJohnFawcett
 
Working in Korea
Working in KoreaWorking in Korea
Working in KoreaPaul Kim
 
Biotech Bulletin -Fall 2015
Biotech Bulletin -Fall 2015Biotech Bulletin -Fall 2015
Biotech Bulletin -Fall 2015Regina M Maxwell
 
Trip to kasargod travalogue
Trip to kasargod travalogueTrip to kasargod travalogue
Trip to kasargod travalogueKiran Thomas
 
REVISTA PEDAGOGIA 3ER MILENIO
REVISTA PEDAGOGIA 3ER MILENIOREVISTA PEDAGOGIA 3ER MILENIO
REVISTA PEDAGOGIA 3ER MILENIOMARIAETM
 
ชีววิทยา1
ชีววิทยา1ชีววิทยา1
ชีววิทยา1Darika Kanhala
 
Finding, Evaluating, Understanding, and Using Information: Information Litera...
Finding, Evaluating, Understanding, and Using Information: Information Litera...Finding, Evaluating, Understanding, and Using Information: Information Litera...
Finding, Evaluating, Understanding, and Using Information: Information Litera...bdobler2
 
Scc2012 Scala
Scc2012 ScalaScc2012 Scala
Scc2012 Scalasteccami
 
Andes Victory - welcome to a different perspective
Andes Victory -  welcome to a different perspectiveAndes Victory -  welcome to a different perspective
Andes Victory - welcome to a different perspectiveandesvictory
 

Viewers also liked (17)

IEEE ICIN 2011
IEEE ICIN 2011IEEE ICIN 2011
IEEE ICIN 2011
 
The Apparent Complete Response- Ian Geh
The Apparent Complete Response- Ian GehThe Apparent Complete Response- Ian Geh
The Apparent Complete Response- Ian Geh
 
K14 strategi perubahan pendidikan
K14 strategi perubahan pendidikanK14 strategi perubahan pendidikan
K14 strategi perubahan pendidikan
 
Organisational and cultural factors that promote resilience
Organisational and cultural factors that promote resilienceOrganisational and cultural factors that promote resilience
Organisational and cultural factors that promote resilience
 
Working in Korea
Working in KoreaWorking in Korea
Working in Korea
 
Food
FoodFood
Food
 
Biotech Bulletin -Fall 2015
Biotech Bulletin -Fall 2015Biotech Bulletin -Fall 2015
Biotech Bulletin -Fall 2015
 
Trip to kasargod travalogue
Trip to kasargod travalogueTrip to kasargod travalogue
Trip to kasargod travalogue
 
REVISTA PEDAGOGIA 3ER MILENIO
REVISTA PEDAGOGIA 3ER MILENIOREVISTA PEDAGOGIA 3ER MILENIO
REVISTA PEDAGOGIA 3ER MILENIO
 
Utilidades
UtilidadesUtilidades
Utilidades
 
ชีววิทยา1
ชีววิทยา1ชีววิทยา1
ชีววิทยา1
 
Finding, Evaluating, Understanding, and Using Information: Information Litera...
Finding, Evaluating, Understanding, and Using Information: Information Litera...Finding, Evaluating, Understanding, and Using Information: Information Litera...
Finding, Evaluating, Understanding, and Using Information: Information Litera...
 
111
111111
111
 
Geo photo
Geo photoGeo photo
Geo photo
 
Limpeza
LimpezaLimpeza
Limpeza
 
Scc2012 Scala
Scc2012 ScalaScc2012 Scala
Scc2012 Scala
 
Andes Victory - welcome to a different perspective
Andes Victory -  welcome to a different perspectiveAndes Victory -  welcome to a different perspective
Andes Victory - welcome to a different perspective
 

Similar to 5th KuVS Meeting

Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpUs 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpOlli-Pekka Niemi
 
RTOS implementation
RTOS implementationRTOS implementation
RTOS implementationRajan Kumar
 
Embedded Intro India05
Embedded Intro India05Embedded Intro India05
Embedded Intro India05Rajesh Gupta
 
Efficient Resource Allocation to Virtual Machine in Cloud Computing Using an ...
Efficient Resource Allocation to Virtual Machine in Cloud Computing Using an ...Efficient Resource Allocation to Virtual Machine in Cloud Computing Using an ...
Efficient Resource Allocation to Virtual Machine in Cloud Computing Using an ...ijceronline
 
9Tuts.Com New CCNA 200-120 New CCNA New Questions 2
9Tuts.Com New CCNA 200-120 New CCNA   New Questions 29Tuts.Com New CCNA 200-120 New CCNA   New Questions 2
9Tuts.Com New CCNA 200-120 New CCNA New Questions 2Lori Head
 
NTP Project Presentation
NTP Project PresentationNTP Project Presentation
NTP Project PresentationAndrew McGarry
 
Topic2 Understanding Middleware
Topic2 Understanding MiddlewareTopic2 Understanding Middleware
Topic2 Understanding Middlewaresanjoysanyal
 
Open Source Software Tools for Synchrophasor Applications
Open Source Software Tools for  Synchrophasor ApplicationsOpen Source Software Tools for  Synchrophasor Applications
Open Source Software Tools for Synchrophasor ApplicationsLuigi Vanfretti
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring toolsAlexander Decker
 
Modification of l3 learning switch code for firewall functionality in pox con...
Modification of l3 learning switch code for firewall functionality in pox con...Modification of l3 learning switch code for firewall functionality in pox con...
Modification of l3 learning switch code for firewall functionality in pox con...eSAT Journals
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTREcscpconf
 
Internets Manage Communication Procedure and Protection that Crash on Servers
Internets Manage Communication Procedure and Protection that Crash on ServersInternets Manage Communication Procedure and Protection that Crash on Servers
Internets Manage Communication Procedure and Protection that Crash on ServersIRJET Journal
 
Powering your next IoT application with MQTT - JavaOne 2014 tutorial
Powering your next IoT application with MQTT - JavaOne 2014 tutorialPowering your next IoT application with MQTT - JavaOne 2014 tutorial
Powering your next IoT application with MQTT - JavaOne 2014 tutorialBenjamin CabĂŠ
 
Sun RPC (Remote Procedure Call)
Sun RPC (Remote Procedure Call)Sun RPC (Remote Procedure Call)
Sun RPC (Remote Procedure Call)Peter R. Egli
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded SystemsAngela Hauber
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded SystemsMEN Mikro Elektronik GmbH
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded SystemsMEN Micro
 
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetImproved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetIJERA Editor
 

Similar to 5th KuVS Meeting (20)

Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpUs 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
 
RTOS implementation
RTOS implementationRTOS implementation
RTOS implementation
 
Embedded Intro India05
Embedded Intro India05Embedded Intro India05
Embedded Intro India05
 
Efficient Resource Allocation to Virtual Machine in Cloud Computing Using an ...
Efficient Resource Allocation to Virtual Machine in Cloud Computing Using an ...Efficient Resource Allocation to Virtual Machine in Cloud Computing Using an ...
Efficient Resource Allocation to Virtual Machine in Cloud Computing Using an ...
 
9Tuts.Com New CCNA 200-120 New CCNA New Questions 2
9Tuts.Com New CCNA 200-120 New CCNA   New Questions 29Tuts.Com New CCNA 200-120 New CCNA   New Questions 2
9Tuts.Com New CCNA 200-120 New CCNA New Questions 2
 
NTP Project Presentation
NTP Project PresentationNTP Project Presentation
NTP Project Presentation
 
Topic2 Understanding Middleware
Topic2 Understanding MiddlewareTopic2 Understanding Middleware
Topic2 Understanding Middleware
 
13 tm adv
13 tm adv13 tm adv
13 tm adv
 
Open Source Software Tools for Synchrophasor Applications
Open Source Software Tools for  Synchrophasor ApplicationsOpen Source Software Tools for  Synchrophasor Applications
Open Source Software Tools for Synchrophasor Applications
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring tools
 
Modification of l3 learning switch code for firewall functionality in pox con...
Modification of l3 learning switch code for firewall functionality in pox con...Modification of l3 learning switch code for firewall functionality in pox con...
Modification of l3 learning switch code for firewall functionality in pox con...
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
 
Internets Manage Communication Procedure and Protection that Crash on Servers
Internets Manage Communication Procedure and Protection that Crash on ServersInternets Manage Communication Procedure and Protection that Crash on Servers
Internets Manage Communication Procedure and Protection that Crash on Servers
 
DDoS.ppt
DDoS.pptDDoS.ppt
DDoS.ppt
 
Powering your next IoT application with MQTT - JavaOne 2014 tutorial
Powering your next IoT application with MQTT - JavaOne 2014 tutorialPowering your next IoT application with MQTT - JavaOne 2014 tutorial
Powering your next IoT application with MQTT - JavaOne 2014 tutorial
 
Sun RPC (Remote Procedure Call)
Sun RPC (Remote Procedure Call)Sun RPC (Remote Procedure Call)
Sun RPC (Remote Procedure Call)
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
 
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetImproved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
 

More from steccami

Programmazione Dinamica.pdf
Programmazione Dinamica.pdfProgrammazione Dinamica.pdf
Programmazione Dinamica.pdfsteccami
 
From hadoop to spark
From hadoop to sparkFrom hadoop to spark
From hadoop to sparksteccami
 
Industry4.0
Industry4.0Industry4.0
Industry4.0steccami
 
Internet Exchange Point
Internet Exchange PointInternet Exchange Point
Internet Exchange Pointsteccami
 
Storia del Teorema dei 4 colori
Storia del Teorema dei 4 coloriStoria del Teorema dei 4 colori
Storia del Teorema dei 4 coloristeccami
 
Contact tracing
Contact tracingContact tracing
Contact tracingsteccami
 
Introduzione al Machine Learning
Introduzione al Machine LearningIntroduzione al Machine Learning
Introduzione al Machine Learningsteccami
 
Sap forum 2015 Milan
Sap forum 2015 MilanSap forum 2015 Milan
Sap forum 2015 Milansteccami
 
SpreadSheetSpace seminar at ICSI
SpreadSheetSpace seminar at ICSISpreadSheetSpace seminar at ICSI
SpreadSheetSpace seminar at ICSIsteccami
 
Smart City application
Smart City applicationSmart City application
Smart City applicationsteccami
 
iCore Smart Transportation use case CRF M3S
iCore Smart Transportation use case CRF M3SiCore Smart Transportation use case CRF M3S
iCore Smart Transportation use case CRF M3Ssteccami
 
Icin2013
Icin2013Icin2013
Icin2013steccami
 
Icin2012
Icin2012Icin2012
Icin2012steccami
 
Cloud Google App Engine Paas
Cloud   Google App Engine PaasCloud   Google App Engine Paas
Cloud Google App Engine Paassteccami
 
Cloud Amazon IaaS aws
Cloud  Amazon IaaS awsCloud  Amazon IaaS aws
Cloud Amazon IaaS awssteccami
 
Introduzione Cloud Computing
Introduzione Cloud ComputingIntroduzione Cloud Computing
Introduzione Cloud Computingsteccami
 
Mashup2010
Mashup2010Mashup2010
Mashup2010steccami
 
Webx 2010
Webx 2010Webx 2010
Webx 2010steccami
 
iiwas2009
iiwas2009iiwas2009
iiwas2009steccami
 
Cloud 2010
Cloud 2010Cloud 2010
Cloud 2010steccami
 

More from steccami (20)

Programmazione Dinamica.pdf
Programmazione Dinamica.pdfProgrammazione Dinamica.pdf
Programmazione Dinamica.pdf
 
From hadoop to spark
From hadoop to sparkFrom hadoop to spark
From hadoop to spark
 
Industry4.0
Industry4.0Industry4.0
Industry4.0
 
Internet Exchange Point
Internet Exchange PointInternet Exchange Point
Internet Exchange Point
 
Storia del Teorema dei 4 colori
Storia del Teorema dei 4 coloriStoria del Teorema dei 4 colori
Storia del Teorema dei 4 colori
 
Contact tracing
Contact tracingContact tracing
Contact tracing
 
Introduzione al Machine Learning
Introduzione al Machine LearningIntroduzione al Machine Learning
Introduzione al Machine Learning
 
Sap forum 2015 Milan
Sap forum 2015 MilanSap forum 2015 Milan
Sap forum 2015 Milan
 
SpreadSheetSpace seminar at ICSI
SpreadSheetSpace seminar at ICSISpreadSheetSpace seminar at ICSI
SpreadSheetSpace seminar at ICSI
 
Smart City application
Smart City applicationSmart City application
Smart City application
 
iCore Smart Transportation use case CRF M3S
iCore Smart Transportation use case CRF M3SiCore Smart Transportation use case CRF M3S
iCore Smart Transportation use case CRF M3S
 
Icin2013
Icin2013Icin2013
Icin2013
 
Icin2012
Icin2012Icin2012
Icin2012
 
Cloud Google App Engine Paas
Cloud   Google App Engine PaasCloud   Google App Engine Paas
Cloud Google App Engine Paas
 
Cloud Amazon IaaS aws
Cloud  Amazon IaaS awsCloud  Amazon IaaS aws
Cloud Amazon IaaS aws
 
Introduzione Cloud Computing
Introduzione Cloud ComputingIntroduzione Cloud Computing
Introduzione Cloud Computing
 
Mashup2010
Mashup2010Mashup2010
Mashup2010
 
Webx 2010
Webx 2010Webx 2010
Webx 2010
 
iiwas2009
iiwas2009iiwas2009
iiwas2009
 
Cloud 2010
Cloud 2010Cloud 2010
Cloud 2010
 

Recently uploaded

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

5th KuVS Meeting

  • 1. Experiments and analysis on Hypervisor-Based Fault Tolerance in Virtualized Environments P. Baglietto, M. Maresca, M. Stecca CIPI - Computer Platform Research Center University of Genoa and Padua, Italy Munich, 11th October 2011 5th GI/ITG KuVS Fachgespräch on NG SDPs
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Experiments Hardware Setup Physical Hosts: IBM Blade Center HS22 (2 Intel E5530 processors at 2,4 GHz, 32GB RAM) Hypervisor: ESX (VMware vSphere) Guest OS: Red Hat Enterprise Linux 5.4 64 bit Sniffers: both the Traffic Injector Sniffer TI_Sniffer and the Logging Sniffer Log_Sniffer run Wireshark (promiscuous mode)
  • 8.
  • 9. Experiment #1 (2/3) Original TCP SYN message captured by TI_Sniffer Original TCP SYN message captured by TI_Sniffer “ Forwarded” TCP SYN message captured by Log_Sniffer
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.